My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is.
☆29Aug 8, 2022Updated 3 years ago
Alternatives and similar repositories for assemblyShenanigans
Users that are interested in assemblyShenanigans are comparing it to the libraries listed below
Sorting:
- This repository contains lectures designed for an introduction to RISC-v and it's capabilities.☆10Sep 19, 2025Updated 5 months ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- Some code associated with my electric car ;-;☆18Nov 6, 2023Updated 2 years ago
- Containing vulnerabilities I've discovered and maybe CVE☆19Apr 14, 2023Updated 2 years ago
- ☆16Dec 3, 2024Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- This is our Compiler Design project for 6th semester.☆12May 15, 2022Updated 3 years ago
- Microprocessor 2 Lab Template☆11Apr 29, 2024Updated last year
- 2022 CTF public release☆23Jun 15, 2022Updated 3 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated 2 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Resize icon for STM32Cube IDE ( toolbar )☆12Sep 23, 2021Updated 4 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Apr 11, 2025Updated 10 months ago
- Review of AWAE.OSWE☆31Mar 12, 2022Updated 3 years ago
- Track HackerOne reports and leaderboard changes on programs through a Discord webhook☆34Jan 31, 2025Updated last year
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- a tui ssh app framework for rust☆16Feb 27, 2026Updated last week
- ARCHIVED - Materials for running a Team-Based Inquiry Learning linear algebra course☆10Jul 30, 2024Updated last year
- ☆12Aug 29, 2022Updated 3 years ago
- This is a repository about how you can Controll KK 2.1.5 flght Controller by using the Rapsberry pi 3.☆12Sep 19, 2019Updated 6 years ago
- A pdp-8 emulator in Python with Tkinter GUI.☆10Mar 25, 2022Updated 3 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- 5 stage pipeline implementation of RISC-V 32I Processor.☆10Nov 27, 2024Updated last year
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 4 months ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆41Sep 23, 2021Updated 4 years ago
- Dynamic Story Scripting with Ink Scripting Language, published by Packt☆17Mar 2, 2026Updated last week
- ☆10Jan 12, 2026Updated last month
- ☆11Jul 19, 2020Updated 5 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Code for the Bavarian R2 Builders' Droid Control System, consisting of dual miniature multi-axis remote controls and a droid control boar…☆17Feb 23, 2026Updated 2 weeks ago
- This is the official codebase for paper: Scaling Verification Can Be More Effective than Scaling Policy Learning for Vision-Language-Acti…☆39Feb 24, 2026Updated 2 weeks ago